I'm glad that you were able to resolve your issue and thank you for posting your solution so that others experiencing the same thing can easily reference this! Since the Microsoft Q&A community has a policy that "The question author cannot accept their own answer. They can only accept answers by others ", I'll repost your solution in case you'd like to "Accept " the answer.
Issue: Provide users read-only access into Azure AD via RBAC and getting error { "shellProps": { "sessionId": "3a061a6d30b54d9398ecf961c38f5aab", "extName": "Microsoft_AAD_IAM", "contentName": "ActiveDirectoryMenuBlade", "code": 403 }, "error": { "message": "No access", "code": 403 }}
Solution: It is not possible to assign RBAC to facilitate access to admin Azure AD (portal). It must be done via AAD built-in or custom roles. It is also not possible to assign AAD custom or built-in roles to groups created / sync'd from on-prem.
If you have any other questions or are still running into more issues, please let me know.
Thank you again for your time and patience throughout this issue.
Please remember to "Accept Answer" if any answer/reply helped, so that others in the community facing similar issues can easily find the solution.
Thanks,
Akshay Kaushik